• Title/Summary/Keyword: 관제정보

Search Result 825, Processing Time 0.033 seconds

Design of Deep Learning-Based Automatic Drone Landing Technique Using Google Maps API (구글 맵 API를 이용한 딥러닝 기반의 드론 자동 착륙 기법 설계)

  • Lee, Ji-Eun;Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.18 no.1
    • /
    • pp.79-85
    • /
    • 2020
  • Recently, the RPAS(Remote Piloted Aircraft System), by remote control and autonomous navigation, has been increasing in interest and utilization in various industries and public organizations along with delivery drones, fire drones, ambulances, agricultural drones, and others. The problems of the stability of unmanned drones, which can be self-controlled, are also the biggest challenge to be solved along the development of the drone industry. drones should be able to fly in the specified path the autonomous flight control system sets, and perform automatically an accurate landing at the destination. This study proposes a technique to check arrival by landing point images and control landing at the correct point, compensating for errors in location data of the drone sensors and GPS. Receiving from the Google Map API and learning from the destination video, taking images of the landing point with a drone equipped with a NAVIO2 and Raspberry Pi, camera, sending them to the server, adjusting the location of the drone in line with threshold, Drones can automatically land at the landing point.

The Design of IoT Device System for Disaster Prevention using Sound Source Detection and Location Estimation Algorithm (음원탐지 및 위치 추정 알고리즘을 이용한 방재용 IoT 디바이스 시스템 설계)

  • Ghil, Min-Sik;Kwak, Dong-Kurl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.53-59
    • /
    • 2020
  • This paper relates to an IoT device system that detects sound source and estimates the sound source location. More specifically, it is a system using a sound source direction detection device that can accurately detect the direction of a sound source by analyzing the difference of arrival time of a sound source signal collected from microphone sensors, and track the generation direction of a sound source using an IoT sensor. As a result of a performance test by generating a sound source, it was confirmed that it operates very accurately within 140dB of the acoustic detection area, within 1 second of response time, and within 1° of directional angle resolution. In the future, based on this design plan, we plan to commercialize it by improving the reliability by reflecting the artificial intelligence algorithm through big data analysis.

Analysis of Operational Issues for ICT-based On-Board Train Control System (ICT 기반 차상제어시스템 개발에 따른 운영 이슈 분석)

  • Kim, Young-Hoon;Choi, Won-Suk
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.6
    • /
    • pp.575-583
    • /
    • 2011
  • In order to minimize the maintenance cost at local lines, Information & Communication Technology based onboard train control system is being developed. Unlike the central traffic control based fixed block system, this system use a moving block method and railway driver direct control switch and railway crossing. The purpose of this paper is to analyze the concerned main operational issues are as follows: the preparation of train operation, drivability, the role of driver and controller, block system and cost. We defined the role of driver and driver's input data for train service, and we designed the business process of driver using UML tool. We considered the aspect of drivability, DMI is needed to support the braking moment for the driver and driver training simulator. We designed the driver business process for control of switch and railway crossing. We analyzed the fixed block system and moving block system to confirm the difference with the existing operational method. The cost analysis structure is also needed for the operation cost comparison.

A Study on the Development of Convergence Security with the Changes in Security Environments (시큐리티 환경변화에 따른 융합보안의 대두와 물리보안업체의 대응)

  • Ahn, Hwang-Kwon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.31-40
    • /
    • 2011
  • As new technologies emerge and threats become increasingly complex and unpredictable, security professionals who are living in the age of information face an increasingly complex array of challenges. In recent, virtually all organizations with physical and IT assets protect those assets in a variety of methods. There are physical systems to protect facilities and their contents from unlawful trespassing. It is important to note that the integration of physical and IT security is to be required: When done correctly, the integration starts with laws, strategies, policies and procedures. Integration of physical and IT security systems is done not for its own sake but in support of security policies and procedures. Significant security improvements can be made by integrating physical and IT security management without necessarily integrating physical and logical electronic security systems. Up to now, the private security industries of the Republic of Korea have been operated and developed by the separation of physical security and industrial security. However, considering the fast changing security environments, physical security companies should turn their attention to security convergence field to cope with the new trends in the security matters. At the same time, governmental supports on the improvement of various laws, regulations and policies in such a way to meet the realistic needs of the industries should be followed.

A Study on Vehicle Tracking System for Intelligent Transport System (지능형 교통시스템을 위한 자동차 추적에 관한 연구)

  • Seo, Chang-Jin;Yang, Hwang-Kyu
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.63-68
    • /
    • 2004
  • In this paper, we propose a method about the extraction of vehicle and tracking trajectory for moving vehicle tracking system in road. This system applied to the monitoring system of the traffic flow for ATMS(advanced traffic management system) of ITS(intelligent transport system). Also, this system can solve the problem of maintenance of loop sensor. And we detected vehicle using differential image analysis. Because of the road environment changes by real time. Therefore, the method to use background image is not suitable. And we used Kalman filter and innovation value and variable search area for vehicle tracking system. Previous method using fixed search area is sensitive to the moving trajectory and the speed of vehicle. Simulation results show that proposed method increases the possibility of traffic measurement more than fixed area traffic measurement system.

Study on a Waypoint Tracking Algorithm for Unmanned Surface Vehicle (USV) (무인수상선을 위한 경유점 추적 제어 알고리즘에 관한 연구)

  • Son, Nam-Sun;Yoon, Hyeon-Kyu
    • Journal of Navigation and Port Research
    • /
    • v.33 no.1
    • /
    • pp.35-41
    • /
    • 2009
  • A waypoint tracking algorithm(WTA) is designed for Unmanned Surface Vehicle(USV) in which water-jet system is installed for propulsion To control the heading of USV for waypoint tracking, the steering nozzle of water-jet need, to be controlled. Firstly, target heading is calculated by using the position information of waypoints input from the land control center. Secondly, the command for the steering nozzle of water-jet is calculated in real time by using the heading and the rate-of-turn( ROT) from magnetic compass, In this study, in order to consider the drift angle due to external disturbance such as wind and wave, the course of ground( COG) can be used instead of heading at higher speed than a certain value, To test the performance of newly-designed WTA, the tests were carried out in actual sea area near Gwang-an bridge of Busan. In this paper, the sea trial test results from WTA are analyzed and compared with those from manual control and those from commercial controller.

Clasification of Cyber Attack Group using Scikit Learn and Cyber Treat Datasets (싸이킷런과 사이버위협 데이터셋을 이용한 사이버 공격 그룹의 분류)

  • Kim, Kyungshin;Lee, Hojun;Kim, Sunghee;Kim, Byungik;Na, Wonshik;Kim, Donguk;Lee, Jeongwhan
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.165-171
    • /
    • 2018
  • The most threatening attack that has become a hot topic of recent IT security is APT Attack.. So far, there is no way to respond to APT attacks except by using artificial intelligence techniques. Here, we have implemented a machine learning algorithm for analyzing cyber threat data using machine learning method, using a data set that collects cyber attack cases using Scikit Learn, a big data machine learning framework. The result showed an attack classification accuracy close to 70%. This result can be developed into the algorithm of the security control system in the future.

Tactical Service Mesh for Intelligent Traffic QoS Coordination over Future Tactical Network (미래 전술망의 지능적 트래픽 QoS 조율을 위한 전술 서비스 메쉬)

  • Kang, Moonjoong;Shin, Jun-Sik;Park, Juman;Park, Chan Yi;Kim, JongWon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.369-381
    • /
    • 2019
  • As tactical networks are gradually shifting toward IP-based flexible operation for diversified battlefield services, QoS(Quality-of-Service) coordination for service differentiation becomes essential to overcome the heterogeneous and scarce networking resources limitations. QoS coordination for tactical network traffic should be able to monitor and react the dynamic changes in underlying network topology and service priorities. In this paper, by adopting the emerging cloud-native service mesh concept into tactical network context, we study the feasibility of intelligent QoS coordination by employing tactical service mesh(TSM) as an additional layer to support enhanced traffic quality monitoring and control. The additional TSM layer can leverage distributed service-mesh proxies at tactical mesh WAN(Wide Area Network) nodes so that service-aware differentiated QoS coordination can be effectively designed and integrated with TSM-assisted traffic monitoring and control. Also, by validating the feasibility of TSM layer for QoS coordination with miniaturized experimental setup, we show the potential of the proposed approach with several approximated battlefield traffics over a simulated TSM-enabled tactical network.

A Study for Cyber Situation Awareness System Development with Threat Hunting (위협 헌팅을 적용한 사이버 상황인식 시스템 개발에 관한 연구)

  • Lee, Jaeyeon;Choi, Jeongin;Park, Sanghyun;Kim, Byeongjin;Hyun, Dae-Won;Kim, Gwanyoung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.807-816
    • /
    • 2018
  • Threat hunting is defined as a process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions. The main concept of threat hunting is to find out weak points and remedy them before actual cyber threat has occurred. And HMM(Hunting Maturity Matrix) is suggested to evolve hunting processes with five levels, therefore, CSOC(Cyber Security Operations Center) can refer HMM how to make them safer from complicated and organized cyber attacks. We are developing a system for cyber situation awareness system with pro-active threat hunting process called unMazeTM. With this unMaze, it can be upgraded CSOC's HMM level from initial level to basic level. CSOC with unMaze do threat hunting process not only detecting existing cyber equipment post-actively, but also proactively detecting cyber threat by fusing and analyzing cyber asset data and threat intelligence.

A Study on the Overload Prevention Effect of Construction Waste Collection and Transportation Vehicles Using On-Board Truck Scale (자중계를 활용한 건설폐기물 수집·운반 차량의 과적 예방효과 연구)

  • Kim, Jong-Woo;Jung, Young-Woo
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.8 no.4
    • /
    • pp.444-449
    • /
    • 2020
  • In this study, On-Board Truck Scale was installed on the construction waste collection / transportation vehicles to monitor the weight of the waste at all stages from generation to final treatment. It was performed as a case study of a construction waste control technology that can efficiently manage the total generating and recycling amount using real-time weight/location information obtained by the On-Board Truck Scale device. As a result of the study, it was confirmed that the total amount of construction waste can be monitored in real time, and a plan for efficient logistics transportation can be derived through the analysis of operation patterns by managing the real-time transport volume, transport distance, and transport time of the construction waste collection / transportation vehicles. It was confirmed that overloading can be prevented in advance by controlling the loading also.